Static task
static1
Behavioral task
behavioral1
Sample
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
-
Size
37KB
-
MD5
7b6b31441c3a261f2ec5268bf9e265da
-
SHA1
44512e2339d0f6f0c5fdd09d39048e62e0337bc1
-
SHA256
3f24adf406a6b813670c31d2f77a4fab0c9f47e76697491807114d055c26b3d5
-
SHA512
d6c5fd06f7d2f079ad764c85d2fe7451b142f67743a4299ca17551eca03061262c0281853659b36a8bd52928230ace2e542f9211a14eaf8c86ba7b29d08afba2
Score
10/10
Malware Config
Extracted
Family
njrat
Version
im523
Botnet
CYBERPRANK
C2
0.tcp.ngrok.io:17402
Mutex
6430e428892ae49edff74c714d359b22
Attributes
-
reg_key
6430e428892ae49edff74c714d359b22
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe.exe windows x86